Information Security Risk Training Courses

Information Security Risk Training Courses

Lokale, geïnstrueerde live trainingen voor Information Security Risk demonstreren door middel van interactieve discussie en handson de basisbeginselen en geavanceerde onderwerpen van informatiebeveiligingsrisico's Informatiebeveiliging Risicostages zijn beschikbaar als "live training op locatie" of "live training op afstand" Onsite live training kan lokaal worden uitgevoerd op het terrein van de klant in Nederland of in NobleProg bedrijfsopleidingscentra in Nederland Live-training op afstand wordt uitgevoerd via een interactieve, externe desktop NobleProg Uw lokale trainingsaanbieder.

Machine Translated



Information Security Risk subcategorieën

Information Security Risk Cursusoverzicht

Course Name
Course Name
28 hours

CISA® is the world-renowned and most popular certification for professionals working in the field of IS audit and IT risk consulting.

Our CISA course is an intense, very competitive and exam focused training course. With experience of delivering more than 150+ CISA trainings in Europe and around the world and training more than 1200+ CISA delegates, the Net Security CISA training material has been developed in house with the top priority of ensuring CISA delegates pass the ISACA CISA® Exam. The training methodology focuses on understanding the CISA IS auditing concepts and practicing large number of ISACA released question banks from the last three years. Over a period, CISA holders have been in huge demand with renowned accountings firms, global banks, advisory, assurance, and internal audit departments.

Delegates may have years of experience in IT auditing but perspective towards solving CISA questionnaires will solely depend on their understanding to globally accepted IT assurance practices. CISA exam is very challenging because the chance of a very tight clash between two possible answers exists and that is where ISACA tests you on your understanding in global IT auditing practices. To address these exam challenges, we always provide the best trainers who have extensive experience in delivering CISA training around the world.

The Net Security CISA manual covers all exam-relevant concepts, case studies, Q&A's across CISA five domains. Further, the Trainer shares the key CISA supporting material like relevant CISA notes, question banks, CISA glossary, videos, revision documents, exam tips, and CISA mind maps during the course.


The ultimate goal is to pass your CISA examination first time.


- Use the knowledge gained in a practical manner beneficial to your organisation
- Provide audit services in accordance with IT audit standards
- Provide assurance on leadership and organizational structure and processes
- Provide assurance on acquisition/ development, testing and implementation of IT assets
- Provide assurance on IT operations including service operations and third party
- Provide assurance on organization’s security policies, standards, procedures, and controls to ensure confidentiality, integrity, and availability of information assets.

Target Audience:

Finance/CPA professionals, I.T. professionals, Internal & External auditors, Information security, and risk consulting professionals.
35 hours

This is a 'Practitioner' course and leans heavily on practical exercises designed to reinforce the concepts being taught and to build the delegates' confidence in implementing business continuity management. The course is also designed to encourage debate, and the sharing of knowledge and experience between students.
Delegates will benefit from the practical and extensive experiences of ours trainers who are practicing business continuity management and ISO 22301:2012 specialists.

Delegates will learn how to:

- Explain the need for business continuity management (BCM) in all organisations
- Define the business continuity lifecycle
- Conducting business continuity programme management
- Understand their organisation sufficiently to identify mission-critical impact areas
- Determine their organisation's business continuity strategy
- Establish a business continuity response
- Exercise, maintain and review plans
- Embed business continuity in an organisation
- Define terms and definitions appropriate to business continuity

By the end of the course, delegates will have a detailed understanding of all the key components of business continuity management and be able to return to their work, making a significant contribution to the business continuity management process.
21 hours
This course will give you the skills to build up information security according to ISO 27005, which is dedicated to information security risk management based on ISO 27001.
35 hours
Who is it for:

Security professionals looking to understand the technical and business aspects of the profession or anyone looking to work in the field of security architecture.

- System Administrators who wish to become security architects
- Technical architects looking to move into the field of security architecture

This certificate also offers a complimentary certification for those awarded or looking to achieve CCP status in IA.

What will I learn:

Candidates should be able to:

- Describe the business environment and the information risks that apply to the systems.
- Describe and apply security design principles.
- Identify information risks that arise from potential solution architectures.
- Design alternate architectures or countermeasures to mitigate identified information risks.
- Ensure that proposed architectures and countermeasures adequately mitigate identified information risks.
- Apply ‘standard’ security techniques and architectures to mitigate security risks.
- Develop new architectures that mitigate the risks posed by new technologies and business practices.
- Provide consultancy and advice to explain Information Assurance and architectural problems.
- Security configure ICT systems in compliance with their approved security architectures.
35 hours
Who is it for:

Anyone who is involved in the areas of information security and information assurance.

What will I learn:

Candidates should be able to demonstrate:

- How the management of information risk will bring about significant business benefits.
- How to explain and make full use of information risk management terminology.
- How to conduct threat and vulnerability assessments, business impact analyses and risk assessments.
- The principles of controls and risk treatment.
- How to present the results in a format which will form the basis of a risk treatment plan.
- The use of information classification schemes.
21 hours

This class is intended as intense and hard core exam preparation for ISACA’s Certified Information Systems Auditor (CRISC) Examination. The five (5) domains of ISACA’s CRISC syllabus will be covered with a big focus on the Examination. The Official ISACA CIRSC Review Manual and Question, Answer and Explanation, (Q,A&E), supplements will ALSO be provided when attending. The Q,A&E is exceptional in helping delegates understand the ISACA style of questions, the type of answers ISACA are looking for and it helps rapid memory assimilation of the material.

The technical skills and practices that ISACA promotes and evaluates within the CRISC certification are the building blocks of success in the field. Possessing the CRISC certification demonstrates your skill within the profession. With a growing demand for professionals holding risk and control expertise, ISACA’s CRISC has positioned itself to be the preferred certification program by individuals and enterprises around the world. The CRISC certification signifies commitment to serving an enterprise and the chosen profession with distinction.


- To help you pass the CRISC examination first time
- possessing this certification will signify your commitment to serving an enterprise with distinction
- the growing demand for professionals with risk and control skills will allow holders of this certification to command better
positions and salary

You will learn:

- To help enterprises accomplish business objectives by designing, implementing, monitoring and maintaining risk-based,
efficient and effective IS controls.
- The technical skills and practices that CRISC promotes, these are the building blocks of success in the field

Aankomende Information Security Risk cursussen

Weekend Information Security Risk cursus, Avond Information Security Risk training, Avond Information Security Risk opleiding Information Security Risk boot camp, Information Security Risk instructeur geleid, Weekend Information Security Risk training, Avond Information Security Risk cursus, Information Security Risk coaching, Information Security Risk instructeur, Information Security Risk trainer, Information Security Risk training cursus, Information Security Risk lessen, Information Security Risk on-site, Information Security Risk privé cursus, Information Security Risk een op een training, Information Security Risk op locatie, Weekend Information Security Risk opleiding

Cursussen met korting

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Een aantal van onze klanten

This site in other countries/regions